{"title":"Chitin: A Security-Enhanced Proof-of-Stake Protocol With View-Interference Resilience","authors":"Hanyue Dou;Peifang Ni;Jing Xu","doi":"10.1109/TIFS.2025.3607237","DOIUrl":null,"url":null,"abstract":"The Proof-of-Stake (PoS) protocol is emerging as one of the most promising blockchain consensus mechanisms, and Ethereum is also undergoing a significant transition to PoS, specifically by adopting Gasper. However, a particularly critical threat faced by existing view-dependent PoS, such as Gasper, lies in view-interference attacks, exemplified by balance attack and reorg attack. These attacks enable adversaries to prevent honest proposals from being committed, thereby directly compromising the fundamental liveness property of blockchain. Currently, there is no effective solution to mitigate such view-interference attacks. In this paper, we present Chitin, a novel view-dependent PoS protocol that is designed to enhance security and effectively mitigate all varieties of view-interference attacks. The core design of Chitin comprises a common set protocol that leverages an innovative deletion mechanism to achieve both a consistent message set and strong termination, while requiring only minimal support from Trusted Execution Environment through its basic validation module. Furthermore, we prove that Chitin not only satisfies safety and liveness, but also possesses resilience against view-interference attacks. Finally, we implement Chitin and conduct comparisons with existing works. The experimental results show that our protocol exhibits superior efficiency, resulting in significant improvements in throughput ranging from 33%-50%, along with reduced communication costs.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"9568-9583"},"PeriodicalIF":8.0000,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11153565/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
The Proof-of-Stake (PoS) protocol is emerging as one of the most promising blockchain consensus mechanisms, and Ethereum is also undergoing a significant transition to PoS, specifically by adopting Gasper. However, a particularly critical threat faced by existing view-dependent PoS, such as Gasper, lies in view-interference attacks, exemplified by balance attack and reorg attack. These attacks enable adversaries to prevent honest proposals from being committed, thereby directly compromising the fundamental liveness property of blockchain. Currently, there is no effective solution to mitigate such view-interference attacks. In this paper, we present Chitin, a novel view-dependent PoS protocol that is designed to enhance security and effectively mitigate all varieties of view-interference attacks. The core design of Chitin comprises a common set protocol that leverages an innovative deletion mechanism to achieve both a consistent message set and strong termination, while requiring only minimal support from Trusted Execution Environment through its basic validation module. Furthermore, we prove that Chitin not only satisfies safety and liveness, but also possesses resilience against view-interference attacks. Finally, we implement Chitin and conduct comparisons with existing works. The experimental results show that our protocol exhibits superior efficiency, resulting in significant improvements in throughput ranging from 33%-50%, along with reduced communication costs.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features